Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
With Radical Changes, Law Firms Can Beat Recession
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Video Sharing App Vine Hit with Takedown Notice from Prince
Can You Patent Human Genes? ACLU Says No
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Safeguards against Data Security Breaches (Part One)
The Growing Role of Social Media in Litigation and How to Prepare for It
Safeguards against Data Security Breaches (Part Two)
How to Protect Your Company From Hackers
How Facebook's Lawyers Price Their Services
What Companies Should Do to Prepare for Implementation of Cybersecurity Executive Order
Two Key Elements Every Social Media Policy Should Include
Jeff Ifrah on the Historic Legalization of Online Gaming in New Jersey
How to Respond to President Obama's Cybersecurity Executive Order
In this issue:
- From the WSGR Database: Financing Trends for Q1 2013
- Valuations by Industry Segment
- Convertible Notes vs. Priced Equity in Seed Round Financings: An Illustration of Capitalization...more
A recently issued government rule may unknowingly create significant liability and legal risk for many technology enterprises. The expanded definition of "business associates" and related interpretations by the Department of...more
The media is replete with reports of a botnet onslaught paralyzing Spamhaus, flaming worms usurping strategic information in the Middle East and a stuxnet super weapon wreaking physical damage to Iran’s nuclear reactors....more
In early 2011 we published our first Seed Financing Survey (for 2010) in recognition of the growing importance of seed financing to entrepreneurs and the venture capital environment, especially in the internet/digital media...more
In This Issue:
- Interpretation and Clarification of Key Definitions
..Covered Drug, Device, Biological or Medical Supply
The Small Business Administration (SBA) recently amended the rules relating to its Small Business Innovation Research (SBIR) program and Small Business Technology Transfer (STTR) program. The new SBA rules implement the...more
Sorry Bill Simmons, but today we celebrate one of the great modern day records of any American sports franchise. On this day 41 years ago, the Milwaukee Bucks beat the Los Angeles Lakers to end the Lakers 33 game winning...more
If there is one issue which causes sleepless nights for business executives, it has to be data privacy and security. While the laws are still being updated and drafted for new technologies and new threats, businesses need to...more
On December 27, 2012, the US Small Business Administration (SBA) published a final rule to amend regulations governing eligibility for the Small Business Innovation Research (SBIR) and Small Business Technology Transfer...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
Internet giant Paypal recently joined Sony, Microsoft, and Netflix to become one of the latest major companies to include a provision banning consumer class actions in its terms of service. Such waivers now frequently appear...more
Technology is central to our daily lives. We rely on it. We embrace it. Many of us can’t live without it. Businesses employ new technology, often as early adopters, in an attempt to increase productivity, stay ahead of the...more
Originally published in Law360, New York on October 22, 2012.
On the heels of a recent survey that found that cybersecurity is becoming the primary concern of corporate general counsels and directors, the United States...more
As noted in this recent blog post, in TruePosition, Inc. v. LM Ericsson Telephone Co., No. 11-4574 (E.D. Pa. Oct. 4, 2012), the court held that a Standard Setting Organization (SSO) known as 3GPP may be liable for alleged...more
On September 19, 2012, John D. (Jay) Rockefeller IV, chairman of the United States Senate Committee on Commerce, Science and Transportation, sent a letter to the CEOs of the Fortune 500 companies, urging the recipients to...more
The promise of renewable energy has been partly realized as renewables, including wind and solar, have attracted significant investment over the years and now generate output that comprises a useful contribution to our...more
New guidance defines when electronically held personal data is "beyond use" once deleted.
As part of its mission to assist companies to understand and fulfil their obligations under the UK's Data Protection Act 1998...more
For many businesses with a particular core technology, one path to a wider market and increased revenues can be to “joint venture” with another company which has a complementary technology or other core strength. This can...more
Cloud computing is transforming entire industries by making massive quantities of computing power available to even the smallest companies on a pay-as-you-go, use-what-you-need basis. Like all new technologies, however, the...more
There are many risks involved in dealing with Chinese companies.
We previously discussed The Importance Of China Due Diligence And Corporate Seals.
And we asked the probing question: Is The Era Of Cheap Goods From China...more
"Reproduced with permission from Law Business Research. This article was first published in Getting the Deal Through - e-Commerce 2013 (published in July 2012; contributing editor:
Robert Bond of Speechly Bircham LLP)....more
As the use of the internet and social media continues to increase rapidly, companies are being challenged to keep up with changing laws and the many ways in which customer and employee data flow in and out of their hands. In...more
Venture investment in healthcare convergence technologies soared in the first half of 2012. According to a recent report from Burrill & Co, digital health, into which they group healthcare IT, mobile health and wireless...more
In a move signaling increased enforcement of the state’s data privacy and security regulations, California’s Attorney General Kamala D. Harris has announced the creation of the Privacy Enforcement and Protection Unit. The...more
Ensuring that key business data survives unexpected events is vital for businesses large and small. That’s why every business should have a plan in place to ensure the availability of its data when manmade or natural...more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo